Support Tree

Support Tree

IT Services and IT Consulting

London, England 704 followers

Specialised Support for the Insurance Sector

About us

At Support Tree, we believe in a holistic approach to helping small and medium-sized businesses (SMEs) reach their goals with the use of technology. Our experienced team of professionals specializes in providing custom solutions that are tailored to each individual's needs. We have helped many organisations increase efficiency, drive more sales, and make better use of their staff resources. We have also used technology to empower our clients to grow and achieve success. By providing secure IT systems, helping them align their technological investments with their business objectives, equipping them with the tools for a successful exit strategy, and ensuring reliable outcomes from technological solutions, we have enabled SMEs to climb up the operational maturity scale. With our values consisting of Growth, Humility, Care, and Team you can be sure Support Tree strives to be the very best it can be to achieve its mantra: To Be A Great Company

Website
http://www.supporttree.co.uk
Industry
IT Services and IT Consulting
Company size
11-50 employees
Headquarters
London, England
Type
Public Company
Founded
2002
Specialties
Support Services, Cloud Services, Managed Services, Strategy, Virtualization, Security, Disaster Recovery, Internet Connectivity, Growth, Technology, Cyber Security, Cloud, Leadership, Culture, and Flexible Working

Locations

  • Primary

    4/4a Bloomsbury Square, Bloomsbury

    London, England WC1A 2RP, GB

    Get directions

Employees at Support Tree

Updates

  • View organization page for Support Tree, graphic

    704 followers

    Remember when #phishing attacks were as obvious as Gareth Southgate in an EU football final? Exotic princes needed your bank details to transfer absurd sums, targeting gullible users, as noted by Cormac Herley from #Microsoft Research. Now, phishing has evolved. As you sip your coffee, you might get an urgent, legitimate-looking email from your bank with subtle signs like an extra letter in the URL or a slightly off logo. Welcome to the new world of phishing, where understanding and identifying these risks is crucial for protection. Read more here 👇

  • View organization page for Support Tree, graphic

    704 followers

    Account Takeovers ☠️ are one of the most harmful ways to access a user’s account Attackers typically impersonate customers, users, or employees to gain access to an account. In 2022, 84% of organisations experienced identity-related breaches, with 96% stating the breach could have been prevented or reduced through identity-focused security measures. Without the right technologies and policies, such as zero trust and vendor management, detecting unusual user behaviour becomes extremely difficult. As a result, these attacks often go unnoticed since the authentication by an attacker can closely resemble that of a legitimate user, especially if the identity and access management (IAM) system is weak or nonexistent. 🔐 Get in contact with Support Tree if you need to know more about account security. #SupportTree #ITSolutions #Cybersecurity

    • No alternative text description for this image
  • View organization page for Support Tree, graphic

    704 followers

    Phishing-resistant multi-factor authentication (MFA) 🔐 uses methods that are much harder for attackers to compromise, even in a phishing attempt. Two common types of phishing-resistant MFA include 👇 ➡️ FIDO2/WebAuthn: These are modern authentication protocols that use hardware tokens or built-in platform authenticators (such as fingerprint readers or facial recognition on devices). They rely on public-key cryptography, meaning the credentials never leave the user's device and can't be intercepted or replayed by an attacker. ➡️ Certificate-based Authentication (PIV/CAC): This uses a physical card or certificate stored on a device to authenticate the user, which is hard for attackers to replicate or steal remotely. These methods ensure that even if a user is tricked into visiting a fake site, the authentication keys cannot be used by the attacker, as they are tied to the legitimate service and often require a physical device for completion. #SupportTree #CybersecurityTips #WeGetIT

  • View organization page for Support Tree, graphic

    704 followers

    Ever heard of Phishing-resistant MFA? Phishing-resistant multi-factor authentication (MFA) refers to a type of MFA that is designed to defend against phishing attacks, where an attacker tricks a user into revealing their credentials. 📲 Traditional MFA, such as SMS-based or app-based authentication, can be vulnerable to phishing if attackers manage to steal both the password and the one-time passcode. 📩 Get in contact with us if you would like to learn more about Phishing-resistant MFA #SupportTree #Cybersecurity

    • No alternative text description for this image
  • View organization page for Support Tree, graphic

    704 followers

    Here are five effective ways to improve online security 👇 ▶️Password Managers: Password managers securely store and generate strong, unique passwords for every account, making it easier to use complex passwords without having to remember them. ▶️ Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring a second form of verification (like a code from your phone) in addition to your password, greatly reducing the chances of unauthorised access. ▶️Security Awareness Training: Security awareness training educates users about online threats such as phishing, social engineering, and unsafe practices, helping individuals and organisations avoid security risks through better decision-making. ▶️Antivirus and Anti-Malware Software: These tools protect your devices from viruses, malware, ransomware, and phishing attempts by scanning, detecting, and removing threats. ▶️Firewalls: Firewalls monitor and control incoming and outgoing network traffic, acting as a barrier between your internal network and potential external threats, blocking suspicious activity. #SupportTree #ITSupport

    • No alternative text description for this image
  • View organization page for Support Tree, graphic

    704 followers

    As cyber threats continue to evolve, it’s more important than ever for businesses to stay one step ahead. Here are three security topics you could discuss with your team, and how Support Tree can help you implement the best solutions. 👇 ➡️ Multi-Factor Authentication (MFA) MFA provides an additional layer of protection by requiring two or more verification factors at login, helping to reduce the risk of malware, phishing, and ransomware attacks. Implementing MFA is one of the most effective ways to secure your company’s sensitive data. ➡️ Single Sign-On (SSO) Using Single Sign-On (SSO) ensures employees can access all their cloud and on-premises apps with one secure login. SSO enhances the likelihood that employees will follow password protection best practices, while improving user experience, boosting productivity, and minimising security risks. ➡️ Passwordless Authentication Passwordless authentication uses advanced technology like biometrics and security keys for seamless and secure login. Combine this with MFA and SSO for a strong, adaptive security framework. 📩 Ready to simplify your cybersecurity management? Let’s connect! Contact us at Support Tree to discuss how we can help protect your business.

  • View organization page for Support Tree, graphic

    704 followers

    Data breaches are more common than ever. Here are the top five tools to check if your email, website, or phone number has been compromised. 👇 ➡️ Have I Been Pwned (HIBP) This is one of the most widely used tools for checking if your email address or phone number has been part of a data breach. Simply enter your details to see if they appear in any known breaches. 🔗 https://haveibeenpwned.com ➡️ Google Safe Browsing Google Safe Browsing checks the safety status of websites. It can help determine if your website has been flagged for malware or phishing and provides alerts if your website has been compromised. 🔗 https://lnkd.in/g7XQJiPu ➡️ SSL Labs by Qualys This tool evaluates the SSL security of your website, identifying if your site is secure or vulnerable to potential attacks, which is important for checking if your website has been compromised 🔗 https://lnkd.in/e2Ki3v8 ➡️ Sucuri SiteCheck Sucuri is a website security platform that scans your website for malware, blacklisting status, and other vulnerabilities. It's great for detecting potential compromises in your web infrastructure. 🔗https://lnkd.in/dEJy2nT ➡️ SpyCloud This tool helps you check whether your emails, domains, or credentials have been exposed in data breaches or leaked credential databases. It’s a robust solution for preventing account takeovers. 🔗https://spycloud.com #SupportTree #ITSupport #Cybersecurity 

  • View organization page for Support Tree, graphic

    704 followers

    As #cybersecurity increasingly becomes a topic of conversation for many organisations, more information is available, leading to a greater understanding of its importance and the best practices for managing it.   A recent survey found that while 41% of respondents believe it has become easier to keep up with cybersecurity requirements, 46% find it more difficult.   However, compared to previous years, there's a clear trend towards easier management, particularly for those with strong security controls and processes. Collaboration plays a key role, with 87% of respondents reporting closer teamwork with other departments, and 75% noting increased collaboration with #ITOperations.   📩 If you'd like to simplify your cybersecurity management, set up a time to connect with us at Support Tree. We get IT ➡ [email protected] #SupportTree #ITSupport

    • No alternative text description for this image

Similar pages

Browse jobs